Application Security Models
Patterned / Bojan Bjelic

Application Security Models

I like to start system design (at the application level) with the security model that will be used to protect the system. Application security models have several attributes that need to be addressed at each layer of the application.

In an earlier blog post, I introduced the attributes of an application security model:

As I finish blog post on the remaining items, I will update this post with links.

We can briefly define each of these attributes as:

Authentication: The process of proving your identity to the system.

Authorization: The process of determining if the authenticated identity is allowed to access the requested server resource based upon a predefined authorization policy.

Confidentiality: Limiting access to the data to parties that should be allowed to see it in transit or at rest.

Integrity: Ensure that the message was not modified in transit between two actors.

Non-Repudiation: Assurance that the actor who sent the message cannot deny that it sent it.

Availability: Measure of the system performing as required.

Auditability: Ability of an Information Security Auditor to have sufficient information after the fact to reproduce an event of interest and confirm that appropriate security policies are in place regarding all aspects of the system (for application users and administrative users

Identity Propagation: A mechanism that, ideally, securely transmits an authenticated identity from one system actor to another (think SAML 2.0 Bearer Tokens or JWT tokens).

Image: Patterned / Bojan Bjelic

要查看或添加评论,请登录

Robert Broeckelmann的更多文章

  • Performance Tuning Methodology

    Performance Tuning Methodology

    I’m taking a brief excursion from my usual identity and API-centric posts to answer a question about performance tuning…

  • Understanding WS-Federation?—?Passive Requestor Profile

    Understanding WS-Federation?—?Passive Requestor Profile

    There are several identity protocols that are commonly supported by Identity Providers today — OAuth2, OAuth2 Token…

  • Summary of Azure Active Directory OAuth2 Authorization Grant and OIDC Authentication Flow Uses

    Summary of Azure Active Directory OAuth2 Authorization Grant and OIDC Authentication Flow Uses

    A while back I needed a summary of which protocols were supported/recommended in different situations by Azure Active…

  • Authentication vs. Federation vs. SSO

    Authentication vs. Federation vs. SSO

    Authentication. Federation.

    1 条评论
  • How To Submit Your Security Tokens to an API Provider, Pt. 2

    How To Submit Your Security Tokens to an API Provider, Pt. 2

    This post was originally published as “How to Submit Tokens to an API Provider, Pt 2” on the Apigee Blog. In a previous…

    3 条评论
  • How To Submit Your Security Tokens to an API Provider Pt. 1

    How To Submit Your Security Tokens to an API Provider Pt. 1

    This post was originally published as “How to Submit Tokens to an API Provider, Pt 1” on the Apigee Blog. There are…

  • SAML2 vs JWT: A Comparison

    SAML2 vs JWT: A Comparison

    This post concludes our discussion of SAML2 and JWT. Here we look at a comparison of the features and use cases of the…

    1 条评论
  • JWT Use Cases

    JWT Use Cases

    This post explores the equivalent JWT use cases corresponding to the five SAML2 use cases that were explored earlier in…

  • OpenID Connect Logout

    OpenID Connect Logout

    The OpenID Connect (OIDC) family of specs supports logout (from a single application) and global (or single) logout…

  • SAML2 Use Cases

    SAML2 Use Cases

    The following blog posts discuss SAML2 use cases that have been explored in this series: SAML v2.0 vs JWT: SAML2 Web…

社区洞察

其他会员也浏览了